SpinetiX Fusion Digital Signage 3.4.8 File Backup/Delete Path Traversal
Title: SpinetiX Fusion Digital Signage 3.4.8 File Backup/Delete Path Traversal
Advisory ID: ZSL-2020-5594
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (4/5)
Release Date: 30.09.2020
PHP/5.3.18-2
Linux 2.6.10
[25.09.2020] Vendor contacted.
[30.09.2020] No response from the vendor.
[30.09.2020] Public security advisory released.
[2] https://www.exploit-db.com/exploits/48844
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/189291
[06.10.2020] - Added reference [1], [2] and [3]
Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2020-5594
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (4/5)
Release Date: 30.09.2020
Summary
At SpinetiX we inspire businesses to unlock the potential of their story. We believe in the power of digital signage as a dynamic new storytelling platform to engage with people. For more than 13 years, we have been constantly innovating to deliver cutting-edge digital signage solutions that help our customers shine. Fusion is a built-in content management application accessible from a standard web browser - it is pre-installed on every HMP200, HMP130, and HMP100 device, and does not require any additional license, cost, or software installation.Description
The application suffers from an authenticated path traversal vulnerability. Input passed via several parameters in index.php script is not properly verified before being used to create and delete files. This can be exploited to write backup files to an arbitrary location and/or delete arbitrary files via traversal attacks.Vendor
SpinetiX AG - https://www.spinetix.comAffected Version
<=3.4.8 (1.0.36274)Tested On
Apache 2.2.34PHP/5.3.18-2
Linux 2.6.10
Vendor Status
[03.08.2020] Vulnerability discovered.[25.09.2020] Vendor contacted.
[30.09.2020] No response from the vendor.
[30.09.2020] Public security advisory released.
PoC
spinetix_path.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] https://packetstormsecurity.com/files/159441/SpinetiX-Fusion-Digital-Signage-3.4.8-Path-Traversal.html[2] https://www.exploit-db.com/exploits/48844
[3] https://exchange.xforce.ibmcloud.com/vulnerabilities/189291
Changelog
[30.09.2020] - Initial release[06.10.2020] - Added reference [1], [2] and [3]
Contact
Zero Science LabWeb: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk